name |
Citrix NetScaler Platinum Edition Load Balancer, Version 9.3, running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS, MPX 5500, MPX 7500, MPX 9500, MPX 10500, MPX 11500, MPX 12500, MPX 13500, MPX 14500, MPX 15500, MPX 16500, MPX 17500, MPX 17550, MPX 18500, MPX 19500, MPX 19550, MPX 20500, MPX 20550, MPX 21500, MPX 21550, VPX 10, VPX 200, VPX 1000, VPX 3000 |
Electronic Health Card Version 2.20 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
DE |
status |
archived |
archived |
not_valid_after |
04.02.2015 |
01.09.2019 |
not_valid_before |
12.03.2012 |
28.12.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP267%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0663a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST267%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0663b_pdf.pdf |
manufacturer |
Citrix Systems, Inc. |
Gemalto |
manufacturer_web |
https://www.citrix.com |
https://www.gemalto.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL4+ |
dgst |
eb375c5d1192d491 |
5308c187050df0d6 |
heuristics/cert_id |
CRP267 |
BSI-DSZ-CC-0663-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ATE_DPT.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
9.3 |
2.20 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP274 |
{} |
heuristics/report_references/directly_referencing |
CRP262 |
BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009 |
heuristics/report_references/indirectly_referenced_by |
CRP274 |
{} |
heuristics/report_references/indirectly_referencing |
CRP253, CRP262, CRP247 |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0425-2009, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP267 v1.0.pdf |
0663a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0663-2009
- cert_item: Electronic Health Card Version 2.20
- cert_lab: BSI
- developer: Gemalto
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0425-2009: 4
- BSI-DSZ-CC-0628: 1
- BSI-DSZ-CC-0628-2009: 2
- BSI-DSZ-CC-0663: 3
- BSI-DSZ-CC-0663-2009: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 1
- BSI-PP-0020-V2-2007-MA-02: 3
- BSI-PP-0020-V2-2007-MA02: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 3
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 20: 4
- AIS 25: 3
- AIS 26: 3
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- below. March 2012 Issue 1.0 Page 11 of 23 Figure 1 TOE Configuration 3 Layer 3 routing (L3 mode) is out of scope as this enables IP forwarding, allowing traffic to be routed according to static routes in the: 1
- out of scope: 1
|
- ConfidentialDocument:
- Electronic Health Card, TOE version 2.20, document version 1.6, 2009-11-26, Gemalto (confidential document) [7] Evaluation Technical Report, Version 3, Date: 2009-11-26, BSI-DSZ-CC-0663, Electronic Health: 1
- STD Configuration Check List For GeGKOS on INFINEON SLE66CX680 PE, version 3.0 2008-04-08, Gemalto (confidential documents) [9] Security Target BSI-DSZ-CC-0663, Document Reference: ASE12R10559 V0.9, Date 2009-11-27: 1
- Version 2.20 (confidential document) [8] Configuration list for the TOE: Configuration Check Electronic Health Card, version 1.0: 1
|
pdf_data/report_metadata |
- /Author: Mike Brown, Nigel Whittaker-Axon, Bhavin Desai
- /Company: Certification Body, CESG
- /CreationDate: D:20120315141538Z
- /Creator: Acrobat PDFMaker 8.1 for Word
- /ModDate: D:20120315141627Z
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20120315141356
- /Title: Certification Report template v3.0
- pdf_file_size_bytes: 467310
- pdf_hyperlinks: http://support.citrix.com/, https://www.citrix.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100201085808+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Electronic Health Card Version 2.20, Gemalto"
- /ModDate: D:20100202090815+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0663-2009
- pdf_file_size_bytes: 716015
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
ST267 v1.0.pdf |
0663b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0425: 1
- BSI-DSZ-CC-0628: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
- EAL:
- EAL 4: 16
- EAL4: 12
- EAL4 augmented: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 3
- ACM_CAP.4: 4
- ACM_SCP.1: 1
- ACM_SCP.2: 5
- ACM_XXX: 1
- ADO:
- ADO_DEL.2: 5
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 18
- ADV_FSP.2: 6
- ADV_HLD.1: 3
- ADV_HLD.2: 6
- ADV_IMP.1: 5
- ADV_IMP.2: 12
- ADV_LLD.1: 9
- ADV_RCR.1: 11
- ADV_SPM: 1
- ADV_SPM.1: 7
- AGD:
- AGD_ADM.1: 16
- AGD_USR: 2
- AGD_USR.1: 8
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 9
- ALC_DVS.2: 1
- ALC_LCD.1: 6
- ALC_TAT: 1
- ALC_TAT.1: 10
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 4
- ATE_DPT.2: 1
- ATE_FUN.1: 11
- ATE_IND.2: 6
- AVA:
- AVA_MSU.3: 12
- AVA_SOF.1: 6
- AVA_VLA.4: 12
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 8
- FDP_ACF: 16
- FDP_ACF.1: 13
- FDP_IFC: 22
- FDP_IFC.1: 10
- FDP_IFF: 22
- FDP_IFF.1: 21
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 32
- FMT_MSA.1: 20
- FMT_MSA.1.1: 1
- FMT_MSA.3: 21
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
|
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 51
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FCS_RND: 5
- FCS_RND.1: 18
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 6
- FDP_ACC.2: 21
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 2
- FDP_ACF: 15
- FDP_ACF.1: 15
- FDP_IFC.1: 3
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP: 6
- FDP_RIP.1: 5
- FDP_SDI: 11
- FDP_SDI.1: 1
- FDP_SDI.2: 12
- FDP_UCT.1: 11
- FDP_UIT: 10
- FDP_UIT.1: 12
- FIA:
- FIA_AFL: 13
- FIA_AFL.1: 10
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 7
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UID: 10
- FIA_UID.1: 10
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 19
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 1
- FMT_MSA: 1
- FMT_MSA.2: 9
- FMT_MSA.3: 3
- FMT_MTD: 39
- FMT_MTD.1: 17
- FMT_MTD.3: 4
- FMT_SMF: 18
- FMT_SMF.1: 9
- FMT_SMR: 17
- FMT_SMR.1: 13
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 11
- FPT_FLS.1.1: 2
- FPT_PHP: 4
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RVM.1: 13
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Gemalto: 2
- Gemalto N.V: 2
- Infineon:
- Infineon Technologies AG: 3
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TUV Informationstechnik: 1
- TÜViT: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 6
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 12
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 4
- physical tampering: 7
- SCA:
- physical probing: 4
- side channels: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
|
- BSI:
- AIS 20: 3
- AIS 34: 2
- AIS 36: 1
- AIS20: 1
- AIS31: 3
- AIS36: 1
- CC:
- CCMB-2005-08-001: 3
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 46-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS1: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Tony Boswell
- /CreationDate: D:20120222221755
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120222221755
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 869566
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
- /Author: Gemalto
- /CreationDate: D:20091201152833+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: eHC : electronic HealthCard
eGK : electronische GesundheitKarte
GeGKos : Gemalto electronische GesundheitKarte operatin system
- /ModDate: D:20100201110137+01'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: Electronic Health Card
- /Title: Security Target Lite - Electronic Health Card GEGKOS 2.20
- pdf_file_size_bytes: 846763
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |